ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
2017 IEEE Conference on Dependable and Secure Computing
Latest Publications
TOTAL DOCUMENTS
93
(FIVE YEARS 0)
H-INDEX
6
(FIVE YEARS 0)
Published By IEEE
9781509055692
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
SDN data path confidence analysis
2017 IEEE Conference on Dependable and Secure Computing
◽
10.1109/desec.2017.8073809
◽
2017
◽
Author(s):
Joshua Alcorn
◽
Scott Melton
◽
C. Edward Chow
Keyword(s):
Data Path
Download Full-text
Accepted Papers
2017 IEEE Conference on Dependable and Secure Computing
◽
10.1109/desec.2017.8073835
◽
2017
◽
Download Full-text
Location privacy-protection based on p-destination in mobile social networks: A game theory analysis
2017 IEEE Conference on Dependable and Secure Computing
◽
10.1109/desec.2017.8073812
◽
2017
◽
Cited By ~ 3
Author(s):
Bidi Ying
◽
Amiya Nayak
Keyword(s):
Game Theory
◽
Social Networks
◽
Privacy Protection
◽
Location Privacy
◽
Mobile Social Networks
◽
Theory Analysis
◽
Location Privacy Protection
Download Full-text
[Copyright notice]
2017 IEEE Conference on Dependable and Secure Computing
◽
10.1109/desec.2017.8073878
◽
2017
◽
Keyword(s):
Copyright Notice
Download Full-text
AES S-box construction using different irreducible polynomial and constant 8-bit vector
2017 IEEE Conference on Dependable and Secure Computing
◽
10.1109/desec.2017.8073857
◽
2017
◽
Cited By ~ 5
Author(s):
Alamsyah
◽
Agus Bejo
◽
Teguh Bharata Adji
Keyword(s):
Irreducible Polynomial
◽
Bit Vector
Download Full-text
Comment on ‘improving the security of protocols of quantum key agreement solely using bell states and bell measurement’
2017 IEEE Conference on Dependable and Secure Computing
◽
10.1109/desec.2017.8073872
◽
2017
◽
Author(s):
Jun Gu
◽
Tzonelih Hwang
Keyword(s):
Key Agreement
◽
Bell States
◽
Quantum Key Agreement
◽
Bell Measurement
Download Full-text
Probabilistic treatment of service assurance in distributed information systems
2017 IEEE Conference on Dependable and Secure Computing
◽
10.1109/desec.2017.8073818
◽
2017
◽
Author(s):
Kaliappa Ravindran
◽
Chin-Tser Huang
Keyword(s):
Information Systems
◽
Distributed Information Systems
◽
Distributed Information
◽
Service Assurance
Download Full-text
Keynote Talk #2: Increase your security effectiveness by automating and machine learning
2017 IEEE Conference on Dependable and Secure Computing
◽
10.1109/desec.2017.8073881
◽
2017
◽
Author(s):
Michael Montoya
Keyword(s):
Machine Learning
◽
Security Effectiveness
Download Full-text
Cyber anonymity based on software-defined networking and Onion Routing (SOR)
2017 IEEE Conference on Dependable and Secure Computing
◽
10.1109/desec.2017.8073856
◽
2017
◽
Cited By ~ 3
Author(s):
Abdelhamid Elgzil
◽
C. Edward Chow
◽
Amer Aljaedi
◽
Naif Alamri
Keyword(s):
Software Defined Networking
◽
Onion Routing
Download Full-text
Enabling practical experimentation in cyber-security training
2017 IEEE Conference on Dependable and Secure Computing
◽
10.1109/desec.2017.8073870
◽
2017
◽
Author(s):
Jian Mao
◽
Zheng Leong Chua
◽
Zhenkai Liang
Keyword(s):
Cyber Security
◽
Security Training
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close